Protect yourself from the data thief!Knowout when throwing away the unnecessary terminal
NO MORE Data Thief!
If you get a shiny gadget with the latest technology, you will want one to the next.However, the more you switch to a new one, the more old terminals you are no longer used.The waste of electrical and electronic devices called e-wastes is said to be 3.4 million tons a year in the United States.
The iPhone3GS on the cracked screen will be garbage for you.However, there is a god to pick up if there is a god to throw away.Some people want a cracked iPhone.A terminal that has not been properly recycled or abandoned is taken by the device that is very hard to say God.
Some of the recycling programs of electrical products are irresponsible for the data inside.The terminal we abandoned may be exported to Ghana or China and are destroyed there, but in this flow, desperate data thief may come.
For example, 2006.Aidaho's power company has leaked corporate information on eBay by E-Waste, which misplaced the road somewhere.Although the power company participated in the hard -dried revision program, it did not erase data when handing out old terminals as disposal.In addition, the company did not delete the data, and as a result, the company's information and employees were leaked to the auction site eBay.
In addition, it is a troublesome story because there are data thieves that pretend to be a terminal disposal company.Last summer, the Rino City Police, Nevada, called for the free e-waste recycling in recruitment of the major classified site Craigslist.It is said that the unnecessary terminal is collected at a low price (free) without the permission of the local government, and the data is removed from it.
Even if it is not a thief to get an old and discarded device, if the data is there, there is a risk that private things will be known to others. Fabrice Tourre (commonly known as Fabulous Fab) is a good example. In 2006, there was a woman from her friend who picked up a personal computer from a trash can in the city of NY. There was nothing in particular in the computer, but the e -mail of the original owner of the PC, Tourley, continued. Five years later, I was surprised to see the name Tourley in the news. Fabrice Tourley is a Goldman Sachs trader and is fighting the US Securities and Exchange Commission (SEC) about real estate securities. This woman handed a computer that seems to be the former Tourley from her computer = trash can to the New York Times, and the Times could get a lot of information about Tourley. is. Tourley, who abandoned a personal computer in the trash can in that area without erasing the data, was certainly stupid.
It is not difficult to find information from an old terminal, whether you are a data thief or a new owner without malicious intent.Because the original owner is not trying to hide the data.Even if the data is deleted and thrown away, if you are familiar with malicious data thief / technology, you can restore lost data.There is also software for that.
What to do then?If you throw it away, first return to the factory shipping state.Rather than deleting the data one by one, before throwing it away.On the other hand, an expert in ID and thief Robert Siciliano commented in a USA today interview that old terminals (especially OSs with Win XP, etc.) remain even if they try to erase data.His advice is that if you are worried, you should break it physically before you throw it away.
There are some towns that are troublesome to throw away. For example, in New York City, the ordinance for throwing old terminals has just been enacted. In many other cities and states, legislation on e-wastes is becoming stricter. The more people you do not want to be fined by illegal dumping, the more the recycling / destroyed contractor market will be exciting. I want to dispose of it without data. That is the destructive certificate. This is a service provided by a company called SHREDIT, which safely disposes documents, etc., which completely destroys the hard drive on a shredder and issues the certificate. The destroyed terminal is, of course, is properly recycled under the law. All the tasks performed here are characterized by the issuance of certificates, which states their safety.
Electronic Recyclers International is also a company that has been claiming to recycle E-Waste after destruction.The terminals brought in can be applied to the shredder, but because they are raw, they can see that the original owner has been broken / no use.CEO John Shegerian says this process is very important in e-waste recycling.The motto is that transparency is the key to erasing / destruction in e-wastes, and it is dangerous without it.
The introduction here is only one example of the US circumstances.How to handle e-wastes depends on the country and local governments.However, in order to fight the data thief, the consciousness of the owner before throwing it away is important.Thorough data erasure.Physical destruction.As the data thief problem is becoming more serious, the terminal destroyer and certificate issuance as mentioned here will penetrate not only companies but also individuals.
Kate Knibbs --Gizmodo US [Original text]
(Soko)